Analysis

  • max time kernel
    138s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-08-2024 05:53

General

  • Target

    29c6df4f70bc29919dba16a04c08800c.exe

  • Size

    1.5MB

  • MD5

    29c6df4f70bc29919dba16a04c08800c

  • SHA1

    0c6083da1f78d6d365138cc96724ee7f33b4b7de

  • SHA256

    7c86e8c4143be0e27af9558ca46b3b4d7c5bee5e58e18902757bc02f6a3863a2

  • SHA512

    30c9c7e62f8cb8d05e3dfcf0c526f9943fb648f91cd156a356550b0be326bde79bcfd638bd8b956577a0b8860eea186a4b80fab1b79deeee6a35515a927db666

  • SSDEEP

    49152:ETXLOO0MV8+2vk1rrts0LDAYjNxyBVQEBX9:EV0gVjrrtsMkYBxQVQEBX9

Malware Config

Extracted

Family

rhadamanthys

C2

https://80.209.243.182:8094/c47580f52cd88a21fb/gb51j2km.kui3h

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:3060
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:748
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4360
    • C:\Users\Admin\AppData\Local\Temp\29c6df4f70bc29919dba16a04c08800c.exe
      "C:\Users\Admin\AppData\Local\Temp\29c6df4f70bc29919dba16a04c08800c.exe"
      1⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3160
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k move Crowd Crowd.cmd & Crowd.cmd & exit
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:208
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1968
        • C:\Windows\SysWOW64\findstr.exe
          findstr /I "wrsa.exe opssvc.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1676
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2728
        • C:\Windows\SysWOW64\findstr.exe
          findstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3480
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c md 327460
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2884
        • C:\Windows\SysWOW64\findstr.exe
          findstr /V "PrideDramaticIconAcknowledge" Occasion
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3652
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c copy /b ..\Default + ..\Too + ..\Scanning + ..\Rivers + ..\Anthropology + ..\Implied + ..\Battle + ..\Tulsa + ..\Packs + ..\Seat + ..\Moved + ..\Giant + ..\Risk + ..\Size + ..\Tax z
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1572
        • C:\Users\Admin\AppData\Local\Temp\327460\Mrna.pif
          Mrna.pif z
          3⤵
          • Deletes itself
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:516
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c schtasks.exe /create /tn "Sticks" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SafeGuard Data Systems\AtlasVault.js'" /sc minute /mo 5 /F
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2004
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks.exe /create /tn "Sticks" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SafeGuard Data Systems\AtlasVault.js'" /sc minute /mo 5 /F
              5⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:2056
          • C:\Windows\SysWOW64\cmd.exe
            cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AtlasVault.url" & echo URL="C:\Users\Admin\AppData\Local\SafeGuard Data Systems\AtlasVault.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AtlasVault.url" & exit
            4⤵
            • Drops startup file
            • System Location Discovery: System Language Discovery
            PID:828
          • C:\Users\Admin\AppData\Local\Temp\327460\Mrna.pif
            C:\Users\Admin\AppData\Local\Temp\327460\Mrna.pif
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1944
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 436
              5⤵
              • Program crash
              PID:2964
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 432
              5⤵
              • Program crash
              PID:2252
          • C:\Users\Admin\AppData\Local\Temp\327460\Mrna.pif
            C:\Users\Admin\AppData\Local\Temp\327460\Mrna.pif
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4216
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4216 -s 436
              5⤵
              • Program crash
              PID:1724
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4216 -s 432
              5⤵
              • Program crash
              PID:392
        • C:\Windows\SysWOW64\choice.exe
          choice /d y /t 5
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2772
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4348,i,11391966286255097843,10588851088187498028,262144 --variations-seed-version --mojo-platform-channel-handle=3664 /prefetch:8
      1⤵
        PID:4232
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1944 -ip 1944
        1⤵
          PID:628
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1944 -ip 1944
          1⤵
            PID:4072
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4216 -ip 4216
            1⤵
              PID:452
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4216 -ip 4216
              1⤵
                PID:1412

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\327460\Mrna.pif

                Filesize

                872KB

                MD5

                c56b5f0201a3b3de53e561fe76912bfd

                SHA1

                2a4062e10a5de813f5688221dbeb3f3ff33eb417

                SHA256

                237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                SHA512

                195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

              • C:\Users\Admin\AppData\Local\Temp\327460\z

                Filesize

                989KB

                MD5

                9b72988705ea734a65d71ddda4ad6db1

                SHA1

                0ba8a6787874fb19cf95fd435bfe8f367d916f24

                SHA256

                954ea9105d0c27e132c46e68dbfaec2a636e933028abd42856979c6836ddacc5

                SHA512

                b741eb8c17fe2c32016a710fe0935bd4fff357b4b8e76230b274572d307ff44d3dc4e81bc2fcd253733bc1b93bdc1b0a2a3941b4a720471ec3a521754dcdbe0c

              • C:\Users\Admin\AppData\Local\Temp\Anthropology

                Filesize

                92KB

                MD5

                99c899ad39bb07a27a8447460e35af41

                SHA1

                b230a12ed8079938fc1d2de97fc3bea94484d68e

                SHA256

                cdb390ee422da6a5bc032f10700c4e502e7a67cb8a7a0b84ffb8948d7dedb205

                SHA512

                386235e15750991a6ea89836b3c2f6c3fd71eb3011fbb45475705717a5b7fd0568aeea9e895515eace855aa011ca16c1755ceeee59b176148cb32b7729c2786b

              • C:\Users\Admin\AppData\Local\Temp\Battle

                Filesize

                70KB

                MD5

                f179ed40289ae135eece0b9c92b74a02

                SHA1

                83a9f14cb07d7bd0164397b814cba2321ab9ec39

                SHA256

                97fb5b49f6a10ceec40702cf665177526c9634e32e83a747803894a7bed26e4d

                SHA512

                e721e5bda372a85a07b3be1b06720fb3a75be03dfd73936777d78902d37b81f66b1ed2637019624ead96ca3e2a4eb3e8c1e4e75cf397c8ccf2a564fc58160843

              • C:\Users\Admin\AppData\Local\Temp\Chair

                Filesize

                871KB

                MD5

                5dd76f9b131bd9280b272b0d9cc7d6fa

                SHA1

                e84ac5ab26fa7dfadd6a2ae8eb44ecfcd1df3fcb

                SHA256

                320109cd5cccab034adcba6b12f5b1c74d5efe15d91f703400ea78574815a5ac

                SHA512

                d7e0785c0fdc17e479ee0b7beddaaa9cda41342d3db299780fd54b3f0f15d6cc152d7c6afecbc96282882ded4684475476a0f302aadcf3f2df3b4ac24823104b

              • C:\Users\Admin\AppData\Local\Temp\Crowd

                Filesize

                17KB

                MD5

                4a25a301384083c2f7f8fbdfc4614a24

                SHA1

                149739f4e25721313cb9b4a54c057c9dfd93bebc

                SHA256

                24fdac4db714a722e4dbf2a8c85fe35e344c506cc62ed56a5eeef374c71114b7

                SHA512

                568306cdb99d8130da2f1270c5fd83f6bc0d0da701770fbfbe3a5406130b59cedd670c42ae94f03d840ade2c3280fb572d97367d2eff6517694dd2e6c2087802

              • C:\Users\Admin\AppData\Local\Temp\Default

                Filesize

                59KB

                MD5

                e58ec233a22a2afd0830ac3fbc1681c4

                SHA1

                9ad2820fc1eaf2db249d3ad5fb8235907bdc8a90

                SHA256

                0d0b3c412c1c548551b9a9b654e4807907f1feee60e54025d58345870411bd96

                SHA512

                f07106bffa69bac69c2d671966f1b2be15abbf02a0b743648bd923b353df61677ab62b82be6a4d5a2b3be6b1ea1d52c6c80cc9518e81ffcd2fc103dcd5e82f7d

              • C:\Users\Admin\AppData\Local\Temp\Giant

                Filesize

                63KB

                MD5

                b54bdfec215fcbb5eef44a9fb3fe1d0f

                SHA1

                304da9580c019ade3315d3491f05c8bbb30d1428

                SHA256

                3be53afcf04355c373c141c8d1530642ce9edcda62832c8a52597d93c420ea1e

                SHA512

                56a51c8e70c81c2251ddc42981d2fd1e5961a630080d84335957fcead012719bd91e09a25bed387c297874c170e3d78247a897cc7a4aaf62ca1e7d108309b565

              • C:\Users\Admin\AppData\Local\Temp\Implied

                Filesize

                70KB

                MD5

                ed5a7e5ebc851ff187e78ddb46d5065c

                SHA1

                999c305e511b8b1d920756fa8c8503a4c2b363ab

                SHA256

                9ba25bcaeca5ec60fc96c1f7fc805b7423e85ac4fd8a1d77fcf0bfa3f8883016

                SHA512

                7d6399f8272db050ad3fa47b838073d5fd1d296f3cb48d30f0ab8cfa1a8da583dd386ceea0483182da72c3e9ba7f3f8c284683ee40d4ede0785713b142b709ac

              • C:\Users\Admin\AppData\Local\Temp\Moved

                Filesize

                62KB

                MD5

                eef9d756ed89cd8996e71d05c44cdf6e

                SHA1

                0adb893d88ad645bdd8f46f0f9e9c8f0eb204fa9

                SHA256

                d3ba00b0523e1e305acc3e771a5bc0be0c313f003a26319e34a6a36a49810094

                SHA512

                fcbb8b00bb7e383870dae9bbebb3c2dc59ba5fa84f3c2f68848588049f4d6bdcab3dbf62377d8afa4ae02de3ac09e8b13cb8b9512c293d79c9d857d3928da2bb

              • C:\Users\Admin\AppData\Local\Temp\Occasion

                Filesize

                767B

                MD5

                596ad1a8bd4e44cb130d1ef1d6059e4e

                SHA1

                ffd897fffad3a748e97fbc7534528a728c4902d3

                SHA256

                85f323e6d3d89c79b5edf83d649109f1507f7469de045dfa87897cda0dad27d0

                SHA512

                89f1c093093fc1005ea34eb078082526ce0bae5ecc4802a5391cf054215a58786ef14272b0f64f7035647f50039130a0fc4d49366fab1ba373e197fe2cea66d6

              • C:\Users\Admin\AppData\Local\Temp\Packs

                Filesize

                66KB

                MD5

                7d69e84c0ae6283a8f23549139890abe

                SHA1

                124d9a9aae603472942ddcad81755cff339cec65

                SHA256

                f20ad5e8e7b0d65ed0960768042e36df8ed864f25a4ca8119571a1371a47adc6

                SHA512

                64762bc8941f0d518e3782e6691c4afff0f04fbbe4a7c1b9ee55898e3d45491a8dc4ff11c074a403027beeb97e0350bc8e4d564072ff0966e60f18b3b34aba83

              • C:\Users\Admin\AppData\Local\Temp\Risk

                Filesize

                58KB

                MD5

                6f81fd8da77909832540096df4593ac9

                SHA1

                e81110b795adbe51d1b72a8c3e6006de70e615cf

                SHA256

                4055bf9c63514d77bfb7dfa721eced4069eddadc7b3c6a0c7293368d74ff2691

                SHA512

                ba720ea339e4cf44fe8cb1d61f6a4b8790927a7d5160e109a0d7f447652a3cf1673342ed3631a2c3f5c4c758dbc4b489dc13af61dc1617405245fa056a0b40c7

              • C:\Users\Admin\AppData\Local\Temp\Rivers

                Filesize

                89KB

                MD5

                d28b51a29abf9056c1d277144706a8b7

                SHA1

                c604d01fddd24901576eb59d5eea6a69dc18b4dc

                SHA256

                92ee2bef2bd3517fc502268c7ffc985133e1d43647c3fa3883e26e144f304c5d

                SHA512

                3e5c90f98a152d6953d5598d1d55baea66bee6a680d939f564ccd98275a158f5af88c8caa04982e348c1e774b43913d5bb80db6dcfe1e86d8b6e1a87b4f35b60

              • C:\Users\Admin\AppData\Local\Temp\Scanning

                Filesize

                60KB

                MD5

                1d4f2a3236547d62be707d93e932b925

                SHA1

                af0ad40544630e7c8ed557bb58454275d906c922

                SHA256

                ac0b214c8f0223cc07229111b54b36f20c5482aab23cc110efa4c12b7eca959f

                SHA512

                c142b69c513f28207d1aba6c28c57d7689e97a86ceaed973d6de57f3d0013b57b6e2fec9f3ec7d1d5385fd51e368bd1c2d5e97003b5dd1e24ba3c7091dab0a89

              • C:\Users\Admin\AppData\Local\Temp\Seat

                Filesize

                93KB

                MD5

                c0a33e9bb8a0ab483b925de981ac8258

                SHA1

                c306979d79134d2c371abeb9ad7fd2534ba5b8f0

                SHA256

                64210f7500d2f989a9ff34abe9a1422bcf0da829d872290d6894b0186dd5c9d0

                SHA512

                4d01c211da779e657c1628f29b56723c162960eb5c8aab420d09a2e06defb0f0936bc47639a81cf135c285ccfe44e1f3ca3060b70d4fbe7ff53964bc48582931

              • C:\Users\Admin\AppData\Local\Temp\Size

                Filesize

                55KB

                MD5

                220b23b4c1bac3a2a41c00933fa7ea94

                SHA1

                540d288a4bd06fdba264f7563645d3c6e4c3870f

                SHA256

                91cb645789886cc2df22ad48cb849d4741c0a42001c8a33e458a2f7605578c79

                SHA512

                a78e5454ea5d3b392d8018bdb3d7a0b0cb30c7e6a553dc045b2b69049184b166e46c67841b5992adffdbf43eb501531937b4846a5017cdf93e1ddcd5426010df

              • C:\Users\Admin\AppData\Local\Temp\Tax

                Filesize

                36KB

                MD5

                de08a0716cee5ecf80e0c63ecf2a2200

                SHA1

                16490f11a336240fcc1d001b824e061e2e32d173

                SHA256

                c4aeda45139db7239ce6ab0396253d5c24856c955d6a58c84b57149c11cf4ef0

                SHA512

                92cf3e5f98a27e24c0d848fcf28756f9295b52e3ce1dca65d336015c38515454b06517894e9c0a57da5906d012b2cd3a7a51c8b96343bab5af8b1ba9d38c1ee2

              • C:\Users\Admin\AppData\Local\Temp\Too

                Filesize

                55KB

                MD5

                7bdedddd79c8976415e0388daed25ba3

                SHA1

                ea748e274f55433990bc33d33b3ded9dda425cdc

                SHA256

                9e32b9f865fc2be033cbcee025dbf3f9c18dba39ae3aa863f23f4743e7aba3c6

                SHA512

                ecf9aca1adaba1e3f5e84b09b7235e02cfa9c3365bcc676100288416afc54048692df627ed512b481e587983a58dfd7a77ad3efc5d1bafbdb4f700ea4bb3037e

              • C:\Users\Admin\AppData\Local\Temp\Tulsa

                Filesize

                61KB

                MD5

                ea83893e0583c7c8d47e1094cce3b8f5

                SHA1

                df478775b782326402d6b3c651bad70bcab772ae

                SHA256

                1062139ed245c9142e27a1849cc8dfc1a50b355ff74c0fc5b84d8e501f3acc7f

                SHA512

                008d249e25cd99e7cc03672a275abc3dcbe6ec0e2eaa006e1290f063cedf61d4c2a0d88ec721983b73fab16fd9a4ed5bd0beb0f49feffb651cea9799ff23afe4

              • memory/748-58-0x0000000000780000-0x0000000000789000-memory.dmp

                Filesize

                36KB

              • memory/748-61-0x00007FFEDE290000-0x00007FFEDE485000-memory.dmp

                Filesize

                2.0MB

              • memory/748-63-0x00000000776E0000-0x00000000778F5000-memory.dmp

                Filesize

                2.1MB

              • memory/748-60-0x00000000026F0000-0x0000000002AF0000-memory.dmp

                Filesize

                4.0MB

              • memory/1944-52-0x0000000000B80000-0x0000000000BFE000-memory.dmp

                Filesize

                504KB

              • memory/1944-55-0x00007FFEDE290000-0x00007FFEDE485000-memory.dmp

                Filesize

                2.0MB

              • memory/1944-57-0x00000000776E0000-0x00000000778F5000-memory.dmp

                Filesize

                2.1MB

              • memory/1944-54-0x0000000004070000-0x0000000004470000-memory.dmp

                Filesize

                4.0MB

              • memory/1944-53-0x0000000004070000-0x0000000004470000-memory.dmp

                Filesize

                4.0MB

              • memory/1944-50-0x0000000000B80000-0x0000000000BFE000-memory.dmp

                Filesize

                504KB

              • memory/1944-49-0x0000000000B80000-0x0000000000BFE000-memory.dmp

                Filesize

                504KB

              • memory/4216-65-0x0000000001200000-0x000000000127E000-memory.dmp

                Filesize

                504KB

              • memory/4216-67-0x0000000001200000-0x000000000127E000-memory.dmp

                Filesize

                504KB

              • memory/4216-70-0x00007FFEDE290000-0x00007FFEDE485000-memory.dmp

                Filesize

                2.0MB

              • memory/4216-72-0x00000000776E0000-0x00000000778F5000-memory.dmp

                Filesize

                2.1MB

              • memory/4216-69-0x0000000003F20000-0x0000000004320000-memory.dmp

                Filesize

                4.0MB

              • memory/4360-75-0x00000000028F0000-0x0000000002CF0000-memory.dmp

                Filesize

                4.0MB

              • memory/4360-78-0x00000000776E0000-0x00000000778F5000-memory.dmp

                Filesize

                2.1MB

              • memory/4360-76-0x00007FFEDE290000-0x00007FFEDE485000-memory.dmp

                Filesize

                2.0MB